🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

system information uts summary.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

1. Responsibility for customer identification The responsibility for identifying customers is crucial in managing customer data and ensuring compliance with regulations like GDPR (General Data Protection Regulation). This involves verifying customer identities and maintaining accurate records which...

1. Responsibility for customer identification The responsibility for identifying customers is crucial in managing customer data and ensuring compliance with regulations like GDPR (General Data Protection Regulation). This involves verifying customer identities and maintaining accurate records which is crucial for security and compliance. 2. Business processes within the company The series of activities, tasks, and steps taken by a company to operate its internal and external activities. These processes span various departments and are essential for achieving organizational goals. 3. SCM (Supply Chain Management) Management of the flow of goods, services, and related information from raw materials to end customers and aims to optimize efficiency, reduce costs, and improve customer satisfaction. 4. TPS (Transaction Processing System) Designed to record and process transactions in real time and normally used to handle routine operations such ass payroll and sales. 5. MIS (Management Information System) Provides managers with the tools to analyze data, make informed decisions, and control operations. Normally used by middle management to make routine decisions. 6. DSS (Decision Support System) Provides decision makers with internal and external sourced data analysis and support to facilitate informed decisions making. Often includes tools like data mining, statistical analysis, and forecasting. 7. Interaction between information systems and organizations Involves how these systems support organizational operations. An effective integration between them ensures that data flows smoothly across different systems. Enhancing efficiency and organizational change. 8. Technical view of the organization How an organization’s structure, processes, and technology interacts to achieve business goals, mostly focusing on efficiency & system integration. 9. Definition of organization A structured group of individuals working together to achieve a common goal. usually characterized by the roles, responsibility, and authority. 10. Factors for using information systems Cost-benefit analysis, technological feasibility, and strategic alignment with organizational goals. Usually influenced by the adoption of information systems, such as costs, efficiency, user needs, and technological trends. 11. Understanding of business processes Business process could be explained as the flow of material, information, and knowledge within a business and identifying how the tasks are performed within a business organization. It could also be defined as the ability to analyze and improve workflow within an organization to enhance productivity and service delivery. 12. Costs incurred in transactions involving companies Costs incurred in transactions include direct costs like hardware and software expenses, as well as indirect costs such as training and maintenance. 13. Leavitt’s organizational resistance model A framework suggesting that changes in one aspect of an organization (structure, technology, people) will affect the other aspects, potentially causing resistance. 14. Moore Law A framework suggesting that changes in one aspect of an organization (structure, technology, people) will affect the other aspects, potentially causing resistance. 15. Types of computing (Co-location, Edge computing, Grid computing, Utility computing)  Co-location: Hosting multiple servers in a single data center.  Edge computing: Processing data closer to the source to reduce latency.  Grid computing: A distributed computing model that harnesses the power of multiple computers to work on complex tasks.  Utility computing: A service model where computing resources are provided as a metered service. 16. Apps Software applications designed for specific tasks on devices, ranging from mobile to desktop environments. 17. Mashups Web applications that combine data and services from multiple sources to create new functionalities or insights. 18. SaaS (Software as a Service) A software distribution model where applications are hosted in the cloud and accessed via the internet, eliminating the need for local installation. 19. Web services Standardized ways of integrating web-based applications using XML, SOAP, and other protocols to facilitate communication over the internet. 20. Modality Refers to the various modes or methods through which services or information are delivered and accessed. 21. Scalability The capability of a system to handle a growing amount of work or the ability to be enlarged to accommodate that growth. 22. Expandability The ability of a system to be expanded or upgraded to include additional features or capabilities. 23. Disruptive IT innovations Technologies that significantly alter or replace existing markets or industries, often creating new ones. 24. Technology trends Current patterns or movements in technology that influence how businesses operate and evolve, such as AI, cloud computing, or IoT. 25. Profiling Current patterns or movements in technology that influence how businesses operate and evolve, such as AI, cloud computing, or IoT. 26. Cloud computing services On-demand computing resources and services delivered over the internet, including storage, processing power, and applications. 27. Structured and unstructured decisions  Structured decisions are routine and well-defined, often resolved with established processes.  Unstructured decisions involve complex scenarios requiring judgment and analysis without clear- cut solutions. 28. Responsibility and accountability in the world of IS (Information Systems) The roles and obligations of individuals and organizations in managing information systems, ensuring data integrity and security. 29. Data redundancy and data inconsistency Data redundancy refers to unnecessary duplication of data, while data inconsistency occurs when duplicate data entries do not match. 30. Protocols in telecommunications network architecture Established rules and standards that govern data communication over networks, ensuring interoperability and reliability. 31. TCP/IP (Transmission Control Protocol/Internet Protocol) The fundamental communication protocol suite for the internet, enabling data exchange across diverse networks. 32. Client/server computing A model where client devices request resources or services from centralized servers, which provide the necessary data or processing power. 33. Local area network A network that connects computers within a limited area, such as a home, school, or office building, enabling resource sharing. 34. Types of signals Different forms of signals used in data transmission, including analog and digital signals, each with distinct properties and applications. 35. High-Capacity Storage Storage solutions that offer large volumes of space for data, such as cloud storage, data centers, or high- capacity hard drives. 36. Sniffing The practice of monitoring and capturing data packets as they travel over a network, often used for analysis or malicious purposes. 37. VPN (Virtual Private Network) A secure connection that encrypts data transmitted over the internet, allowing users to access private networks remotely and safely. 38. Types of Network Channels Various pathways for data transmission in networks, including wired (e.g., fiber optics) and wireless (e.g., Wi-Fi) channels. 39. RFID (Radio Frequency Identification) A technology that uses electromagnetic fields to automatically identify and track tags attached to objects. 40. Types of Networks Different classifications of networks based on size and scope, including LAN, WAN (Wide Area Network), and MAN (Metropolitan Area Network). 41. Networking Approach Strategies and methods used to connect and manage devices within a network, impacting performance and security. 42. Network Devices and Components Hardware elements required for networking, including routers, switches, hubs, and network interface cards. 43. IS Audit (Information Systems Audit) An evaluation of information systems to ensure the integrity, confidentiality, and availability of data and compliance with regulations. 44. Disaster Planning and Recovery Approach Strategies and procedures designed to prepare for and recover from unexpected events that disrupt normal business operations. 45. Blockchain A decentralized digital ledger technology that securely records transactions across multiple computers, ensuring transparency and immutability. 46. Competitive Strategy A plan of action that a company employs to gain a competitive advantage in the marketplace, often through differentiation or cost leadership. 47. Information Technology Governance The framework that ensures IT investments support business goals, manage risks, and deliver value. 48. Organizational Features Characteristics of an organization that affect its structure, culture, and operational effectiveness, including hierarchy and communication patterns. 49. Porter’s Competitive Forces Model A framework for analyzing the competitive environment of an industry, including the bargaining power of suppliers and buyers, threat of new entrants, and rivalry among existing competitors. 50. Early Warning Detection System (EWD) Systems designed to identify potential problems or threats early, allowing organizations to respond proactively. 51. Privacy Threats Risks to an individual's or organization's personal information, often arising from data breaches, unauthorized access, or misuse of information. 52. Technical Solutions to Protect Privacy Various technologies and practices implemented to safeguard personal information, such as encryption, access controls, and anonymization. 53. Ethical Issue Analysis The process of evaluating moral dilemmas related to information systems, considering implications for stakeholders and society. 54. Input of an Information System The data and information fed into an information system to be processed and transformed into meaningful outputs. 55. ERP (Enterprise Resource Planning) Systems Technology Infrastructure The underlying technology that supports ERP systems, integrating various business processes across an organization. 56. Quantum Computer An advanced computing system that uses quantum bits (qubits) to perform complex calculations at speeds unattainable by classical computers. 57. Open Source Platform Software that is freely available for use, modification, and distribution, fostering collaboration and innovation within the developer community. 58. Information Systems Activities The various functions and processes carried out by information systems, including data collection, processing, storage, and dissemination. 59. Information System A coordinated set of components for collecting, storing, and processing data, and for delivering information to support decision-making. 60. Social Tool Matrix A framework for analyzing social tools and their applications within organizations, considering factors like user engagement and functionality. 61. Supporting Activities in the Company’s Value Chain Additional processes that enhance the value of primary activities, such as human resources, technology development, and procurement. 62. Complementary Assets Resources and capabilities that enhance the value of IT investments, such as skilled personnel, organizational culture, and effective management practices. 63. User Privacy Aspects Considerations related to the protection of individual users' personal information and data privacy within information systems. 64. Collaborative Distribution System A network facilitating the joint distribution of goods and services among multiple partners, enhancing efficiency and reach. 65. Core Competencies and Information Systems The unique strengths or capabilities of an organization that can be enhanced or supported by effective use of information systems. 66. Data Discrepancy Differences or inconsistencies in data that can arise from errors, miscommunication, or lack of synchronization across systems. 67.Data Duplication The presence of identical data entries in a database or system, often leading to confusion and inefficiencies. 68. Data Inconsistency Occurs when related data in a database does not match, often due to updates or changes not being uniformly applied. 69. Data Redundancy The unnecessary repetition of data within a database, which can lead to increased storage costs and complications in data management. 70. DDoS (Distributed Denial of Service) An attack that aims to overwhelm a service or network by flooding it with traffic from multiple sources, disrupting normal operations. 71. Desktop as a Service A cloud computing solution that provides virtual desktops to users over the internet, allowing access from various devices. 72. Digital Certificate System A system that uses digital certificates to establish secure communications and verify the identity of users or devices. 73. Disintermediation The process of eliminating intermediaries in a supply chain, allowing direct transactions between producers and consumers. 74. DNS (Domain Name System) A hierarchical system that translates human-readable domain names into IP addresses, enabling web navigation. 75. DSL (Digital Subscriber Line) A high-speed internet connection that uses telephone lines for data transmission, allowing simultaneous voice and data service. 76. Six Important Goals of Using Information Technology Goals such as improving efficiency, enhancing communication, supporting decision-making, increasing productivity, enabling flexibility, and fostering innovation. 77. Enterprise Applications Large-scale software solutions that support business processes and operations across an organization, often integrating various functions. 78. Enterprise Planning System A system that helps organizations plan and manage resources, projects, and operations effectively. 79. Evolution of IT Infrastructure The historical development of IT systems and technologies, adapting to changing business needs and technological advancements. 80.Extranet A controlled private network that allows external parties (like suppliers or partners) to access certain information and resources within an organization. 81. Fault-Tolerant Computer Systems Systems designed to continue operating properly even in the event of a failure of one or more components. 82. FTP (File Transfer Protocol) A standard network protocol used to transfer files between a client and server over the internet. 83. Hacking The act of exploiting vulnerabilities in computer systems or networks to gain unauthorized access, often for malicious purposes. 84. HTTP (Hypertext Transfer Protocol) The protocol used for transmitting web pages over the internet, facilitating communication between clients and servers. 85. Infrastructure as a Service (IaaS) A cloud computing service model providing virtualized computing resources over the internet, allowing businesses to scale as needed. 86. Intranet A private network accessible only to an organization’s staff, often used for internal communication and collaboration. 87. Information Technology Investment The allocation of resources towards IT initiatives and infrastructure to improve business operations and competitive advantage. 88. Types of Logical Database Models Various frameworks for structuring and organizing data within databases, including relational, hierarchical, and network models. 89. Information Technology Capabilities The skills and resources an organization possesses to effectively utilize IT for strategic advantage. 90. Vulnerability in Software Development Weaknesses in software that can be exploited by attackers, often due to coding errors or lack of security measures. 91. Malicious Software Software designed to harm, exploit, or otherwise compromise computer systems, including viruses, worms, and spyware. 92. Malware A broad category of malicious software designed to disrupt, damage, or gain unauthorized access to computer systems. 93. Modem A device that modulates and demodulates signals for data transmission over telephone or cable lines, enabling internet connectivity. 94. Multi-Tier Server Network A network architecture that separates different layers of application functionality across multiple servers, enhancing performance and scalability. 95. Database Constructor A tool or software that facilitates the creation and management of databases, often providing user- friendly interfaces for non-technical users. 96. Environmental Observation on Surroundings (Strobe) A methodology for monitoring environmental conditions, potentially leveraging technology for data collection and analysis. 97. Impact of Information Technology The significant effects that IT has on business operations, societal interactions, and overall economic conditions. 98. Using Information Systems for Business Purposes The application of information systems to enhance business operations, decision-making, and overall efficiency. 99. Digital Company An organization that fully utilizes digital technologies to operate and deliver value, often characterized by a high level of digital integration. 100. Pharming A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information. 101. Phishing A method of tricking individuals into revealing personal information through deceptive emails or websites. 102. Platform as a Service (PaaS) A cloud computing model that provides a platform allowing customers to develop, run, and manage applications without the complexity of infrastructure management. 103. Reverse Logistics System The process of managing the flow of products returned from customers back to the company for reuse, recycling, or disposal. 104. Non-Obvious Relationship Awareness (NORA) System A system that analyzes data from various sources to uncover hidden relationships and patterns, often used in fraud detection. 105. Social Engineering Manipulating individuals into divulging confidential information by exploiting psychological factors rather than technical hacking. 106. Software as a Service (SaaS) A software distribution model where applications are hosted in the cloud and accessed via the internet, eliminating the need for local installation. 107. Spamming The practice of sending unsolicited messages, often in bulk, typically for advertising purposes. 108. Spyware with Consent Software that gathers user information with the user’s permission, often for marketing or analysis purposes. 109. Supply Chain Management System A system that oversees and manages the entire supply chain process, from procurement of materials to delivery of products. 110. Targeting The practice of focusing marketing efforts on specific demographics or customer segments to improve engagement and conversion rates. 111. Ethics Theory, Principles, and Frameworks Various philosophical approaches and guidelines that inform ethical decision-making in information systems and technology. 112. The IT Value Chain A model that outlines how IT contributes to creating value within an organization through various processes and activities. 113. Three Activities in an Information System Input (data collection), processing (data transformation), and output (information dissemination). 114. Information Technology Goals Objectives that organizations aim to achieve through the use of IT, such as enhancing efficiency, improving decision-making, and fostering innovation. 115. Virus A type of malicious software that attaches itself to legitimate programs and spreads to other computers, often causing harm or disruption. 116. Worms A type of malware that replicates itself to spread across networks, often exploiting vulnerabilities without needing to attach to other programs.

Use Quizgecko on...
Browser
Browser